• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.031 seconds

Design and Implementation of An Automatic Telemetering/Rate Notification System Using CDMA Mobile Communication Modules (CDMA 이동통신모듈을 이용한 원격자동검침 및 요금통보 시스템의 설계 및 구현)

  • Kang, Chang-Soon;Kim, Soo-Jeong;Ko, Eun-Young
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.7
    • /
    • pp.977-985
    • /
    • 2008
  • This paper is concerned with automatic telemetering system which reads the consumed quantity of electricity, gas, and piped water. The existing metering method such that a meterman visits households and directly reads meters can cause several problems, including violation of privacy and the possibility of criminal accident, as well the inefficiency in viewpoint of system operation and rate notification. In this paper, we propose a new automatic telemetering and rate notification system, in which the system reads several meters at remote locations and notifies the rates to the customer's cellular phone with short message service(SMS). The proposed system has been developed by using CDMA mobile communication modules and personal computers. This system can operate only with cellular communication network even without wired-internet facilities. In particular, the developed system can provide home security and convenience as well as cost reduction, and thus be applied to intelligent home networks.

  • PDF

Study on the families' participation need for labour women (산부가족의 분만참여 요구)

  • Chang, Soon-Book;Choi, Yun-Soon;Kim, Hae-Sook;Cho, Young-Sook;Lee, Hae-Woo
    • The Korean Nurse
    • /
    • v.31 no.3
    • /
    • pp.62-75
    • /
    • 1992
  • This study was done to suggest basic modifications in the present situation for the family of women in labour which is a separation management method. The study design was a descriptive study. The number of the subjects were 80. they were husbands, mothers in law, and mothers of women in labour who were full term and for whom there were no complications, either for the mother or the fetus. Data collection was done with a structured questionnaire which was analyzed using frequencies. The results were as follows, 1. Most of the subjects(95.0%) wanted to participate in the labour process. 2. The subjects wanted to support the women in labour by way of encouraging(95.0%), consoling (95.0%), listening to(75.0%), praying with(68.8%), hand holding(97.5%), stroking(63.8%), helping with respiration control(50.0%), maintaining relaxation(46.3%), changing position(58.8%), and illustration (58.8 %). 3. The subjects answered that they expected their participation to have the effect of an easier labour course(52.5%), security for the women in labour(95.0%), and providing a better relationship between the women in labour(66.3%) and the new baby(55.0%). 4. The priority of the response as to who is the best supporter was husband, and mother of the women in labour in that order. It can be concluded that nurses maintained a management method which ignored the needs of the families of women in labour. If given consideration is to be given to these subjects, future programs should initiate ways to let the families participate in the labour process.

  • PDF

Design and Implementation of HDFS Data Encryption Scheme Using ARIA Algorithms on Hadoop (하둡 상에서 ARIA 알고리즘을 이용한 HDFS 데이터 암호화 기법의 설계 및 구현)

  • Song, Youngho;Shin, YoungSung;Chang, Jae-Woo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.2
    • /
    • pp.33-40
    • /
    • 2016
  • Due to the growth of social network systems (SNS), big data are realized and Hadoop was developed as a distributed platform for analyzing big data. Enterprises analyze data containing users' sensitive information by using Hadoop and utilize them for marketing. Therefore, researches on data encryption have been done to protect the leakage of sensitive data stored in Hadoop. However, the existing researches support only the AES encryption algorithm, the international standard of data encryption. Meanwhile, Korean government choose ARIA algorithm as a standard data encryption one. In this paper, we propose a HDFS data encryption scheme using ARIA algorithms on Hadoop. First, the proposed scheme provide a HDFS block splitting component which performs ARIA encryption and decryption under the distributed computing environment of Hadoop. Second, the proposed scheme also provide a variable-length data processing component which performs encryption and decryption by adding dummy data, in case when the last block of data does not contains 128 bit data. Finally, we show from performance analysis that our proposed scheme can be effectively used for both text string processing applications and science data analysis applications.

Design of MBB System for provide Mobility continuity in Environment IPSec (IPSec 환경에서 연속적인 이동성 제공을 위한 MBB 시스템 설계)

  • Kim, Seon-Young;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.478-484
    • /
    • 2008
  • When a mobile node moves, MIPv6 operates an authentication process for the new connection. These kinds of frequent binding update and authentication processes cause much traffic and delay the service. To solve this problem, PMIPv6 provides a network-based mobility protocol in order to lessen the load on a mobile node. However, when it is moved from a domain to a domain or in a domain, there still lies a need fDr a new address, so MIPv6's demerit still exists. In IPsec, too, a new negotiation should be made when it is moved to WAN(Wide Area Network). This causes load to the mobile node. In this paper suggests MBB(Make Before Break) system to eliminate disconnections or delays resulted from the address change or renegotiation for security. When the mobile node receives a CoA address, IPsec negotiation gets operated. Its identity is authenticated by sending the identifier used for the prior negotiation to CN(Correspondent Node) through the BID message suggested. After that, negotiation Bets simplified that disconnections can be eliminated, and in the IPsec negotiation, the load on the mobile node can be lessened as well; moreover, two addresses are used for the communication simultaneously, so the probability of packet loss can be reduced.

Design of a Binary Adder Structure Suitable for High-Security Public Key Cryptography Processor (고비도 공개키 암호화 프로세서에 적합한 이진 덧셈기의 구조 연구)

  • Moon, Sang-Gook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.1976-1979
    • /
    • 2008
  • Studies on binary adder have been variously developed. According to those studies of critical worst delay and mean delay time of asynchronous binary adders, carry select adders (CSA) based on hybrid structure showed 17% better performance than ripple carry adders (RCA) in 32 bit asynchronous processors, and 23% better than in 64 bit microprocessor implemented. In the complicated signal processing systems such as RSA, it is essential to optimize the performance of binary adders which play fundamental roles. The researches which have been studied so far were subject mostly to addition algorithms or adder structures. In this study, we analyzed and designed adders in an asp;ect of synthesis method. We divided the ways of implementing adders into groups, each of which was synthesized with different synthesis options. Also, we analyzed the variously implemented adders to evaluate the performance and area so that we can propose a different approach of designing optimal binary adders.

Design of Hybrid Communication Structure for Video Transmission in Drone Systems (드론 영상 전송용 하이브리드 통신 구조의 설계)

  • Kim, Won
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.9-14
    • /
    • 2019
  • In modern society drones are actively utilized in the fields of security, defense, agriculture, communication and so on. Smart technology and artificial intelligence software have been developed with convergence, and the field of use is expected to expand further. On the point of the excellent performance of drones one of the essential technologies is the wireless communication that make the ground facility receive the video streaming obtained by the drones in the air. In the research the concept of communication region is proposed to cover the both the low altitude region for Wi-Fi communication and the high altitude region for LTE communication for the sake of video transmission. Also the hybrid communication structure is designed along the proposed concept and the proposed system is implemented as a communication system in the small size which can be mounted in a small size of drone. It is confirmed that the proposed system contains the effectiveness by showing the ability to successfully transmit HD video streaming in the range of 500 meters and the transfer time between two different communication systems is measured in 200msec by the experiments.

Development and Evaluation of 3-Axis Gyro Sensor based Servo motion control (3-Axis Gyro Sensor based on Servo Motion Control 장치의 성능평가기준 및 시험규격개발)

  • Lee, WonBu;Chang, Chulsoon;Kim, JeongKuk;Park, Soohong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.627-630
    • /
    • 2009
  • The combination of the marine use various multi sensor surveillance system technology with the development of servo motion control algorithm and gyro sensor in six freedom motion is implemented to analyze the movement response. The stabilization of the motion control is developed and Nano driving Precision Pan-Tilt/Gimbal system is obtained from the security positioning cameras with ultra high speed device is used to carry out the exact behavior of the device. The exact behavior will be used to make a essential equipment. Finally the development of the Nano Driving Multi Sensor, Nano of Surveillance System Driving Precision Pan-Tilt/Gimbal optimal design and production, 3-aix Gyro Sensor based with Servo Motion Control algorithm development, Image trace video software and hardware tracking the development is organized and discuss in details. The development of the equipment and the system integration are fully experimented and verified.

  • PDF

A study of the fresh properties of Recycled ready-mixed soil materials (RRMSM)

  • Huang, Wen-Ling;Wang, Her-Yung;Chen, Jheng-Hung
    • Computers and Concrete
    • /
    • v.17 no.6
    • /
    • pp.787-799
    • /
    • 2016
  • Climate anomalies in recent years, numerous natural disasters caused by landslides and a large amount of entrained sands and stones in Taiwan have created significant disasters and greater difficulties in subsequent reconstruction. How to respond to these problems efficaciously is an important issue. In this study, the sands and stones were doped with recycled materials (waste LCD glass sand, slag powder), and material was mixed for recycled ready-mixed soil. The study is based on security and economic principles, using flowability test to determine the water-binder ratio (W/B=2.4, 2.6, and 2.8), a fixed soil: sand ratio of 6:4 and a soil: sand: glass ratio of 6:2:2 as fine aggregate. Slag (at concentrations of 0%, 20%, and 40%) replaced the cement. The following tests were conducted: flowability, initial setting time, unit weight, drop-weight and compressive strength. The results show that the slump values are 220 -290 mm, the slump flow values are 460 -1030 mm, and the tube flow values are 240-590 mm, all conforming to the objectives of the design. The initial setting times are 945-1695 min. The unit weight deviations are 0.1-0.6%. The three groups of mixtures conform to the specification, being below 7.6 cm in the drop-weight test. In the compressive strength test, the water-binder ratios for 2.4 are optimal ($13.78-17.84kgf/cm^2$). The results show that Recycled ready-mixed soil materials (RRMSM) possesses excellent flowability. The other properties, applied to backfill engineering, can effectively save costs and are conducive to environmental protection.

Effects of Foot Bath on Leg Edema and Fatigue among College Students (족욕요법이 대학생의 하지부종과 피로감에 미치는 효과)

  • Seo, Sukyong;Yoon, Minyoung;Yeon, Seunguk
    • Journal of the Korean Society of School Health
    • /
    • v.30 no.1
    • /
    • pp.21-28
    • /
    • 2017
  • Purpose: This study was conducted to examine the effect of foot-bath on lower extremities edema and fatigue among college students in Korea. Methods: This study used an quasi-experimental design with 56 participants (30 for experiments and 26 for controls). The experimental group performed 20-minute foot bath before sleep three times for one week. All subjects were directed to use their smart-phones to fill out a questionnaire about fatigue. Leg circumference was measured 10 minutes after foot bath. The test was performed from April 30th to May 22th in 2016. Data was analyzed using t-test and $x^2$ test. Results: We found no difference in general characteristics between the experimental group and the control group. Left leg edema of the experimental group decreased by $16.63{\pm}14.57mm$ (p<.001). The experimental group's right leg-edema decreased by $13.10{\pm}13.97mm$ (p<.001). There was no statistically significant difference in their fatigue level when comparing before and after the foot baths. Conclusion: We found that doing foot baths for two weeks could have positive effects in reducing leg-edema among college students. Foot bath may be applied as an effective nursing intervention to decrease leg edema among young people. The results are based on a limited number of study samples and a short-term intervention. Further research can be performed with extended population and a prolonged study period.

Fuzzy Deterministic Relations (퍼지 디터미니스틱 관계)

  • Sung, Yeoul Ouk;Lee, Hyun Kyu;Yang, Eunmok
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.377-382
    • /
    • 2021
  • A fuzzy relation between X and Y as fuzzy subset of X × Y was proposed by Zadeh. Subsequently, several researchers have applied the notion of fuzzy subsets to various branches of mathematics and computer sciences. Murali an Nemitz have studied fuzzy relations connected with fuzzy equivalence relations and fuzzy functions. Ounalli and Jaoua defined a fuzzy difunctional relation on a set. difunctional relations are versatile mathematical tool, which can be used in software design and in database theory. Their work have revealed the usefulness of difunctional relations in program specification and in defining program correctness. The main goal of this paper is to define a fuzzy deterministic relation on a set, characterize the fuzzy deterministic relation as its level subsets and investigate some properties in connection with fuzzy deterministic relation. In particular we prove that a fuzzy relation R is fuzzy deterministic iff R is a fuzzy function.